Connected Objects Input

Invisibly tread the internet with SilentKeys keyboard

Like it or not, this is the age of mass surveillance. While companies and governments love that the public’s most sensitive information is up for grabs, it makes for an increasingly compromised world, one in which beliefs and actions can be used against us. For those much malicious entities, that can mean social and financial ruin if not properly protected.

The revelations of the NSA’s mass surveillance program prompted many in the world to change the way they lived online. Preevio believes that having nothing to hide doesn’t mean having to show it all, and built the SilentKeys keyboard to help people secure their online actions no matter where they are. The all-in-one privacy keyboard connects to any PC or Mac and boots into a completely fresh, anonymous, and protected instance of the Satya desktop.

As a fork of the highly-regarded, highly-private Tails OS, Satya allows for anonymous Tor-based browsing using banking-level encryption for all traffic, blocks ads and keylogging attempts, and is virus and malware proof by ignoring the OS and hard disk of the computer it’s on. Together, it allows for a completely distinct, completely protected, completely anonymous working and browsing experience in full privacy every single time. $190 gets security-minded backers their very own SilentKeys in black or white by November 2016. The Kickstarter campaign is looking for about $56,000 by July 5th to see success.

This is an important product — relevant in so many ways to anyone who relies on the internet in any capacity. The threat of mass surveillance and hackers are both very real, especially those traveling through potentially dangerous countries. While people can outfit a computer they own with everything SilentKeys offers, having the ability to use the keyboard on any computer anywhere and still enjoy its many benefits is powerful. Other products like the Dark-Ingress Wi-Fi Router do the same for any device connected to your computer, but the potential for someone to maliciously access the device is still there — not to mention its lack of versatility and portability.

Leave a Reply